Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Collection "Information Technology and Security"
About
Journal Summary
Focus and Scope
Sections
Publication Frequency
Peer Review Process
Open Access Policy
Privacy Statement
Editorial Team
Editorial board
Current
Archives
Submissions
Announcements
Contact
Search
Search
Register
Login
Search
Search
Home
/
Archives
/
Vol. 4 No. 1 (2016)
Vol. 4 No. 1 (2016)
Published:
2016-06-30
INFORMATION TECHNOLOGY
Corporate system of network information resources monitoring based on multi-agent approach
Dmytro Lande, Vadym Dodonov, Taras Kovalenko
5-12
PDF (Русский)
INFORMATION SECURITY
Social networking services as a national cyber security subject
Kateryna Molodetska
13-20
PDF (Українська)
Modern aspects of updating international standards of series ISO/IEC 27000
Yuliia Kozhedub
20-26
PDF (Українська)
Use of keyboard handwriting in systems of the user authentication
Viktor Yevetskyi, Ivan Horniichuk
27-33
PDF (Українська)
Implementation of information security management system in organization
Vitalii Bezshtanko, Oleksandr Makarevych
33-43
PDF
NETWORK AND APPLICATION SECURITY
Anomaly detection system for mobile carrier based on Big Data concept
Serhii Bondarovets, Oksana Koval, Serhii Hnatiuk
44-53
PDF (Українська)
Availability government web resources monitoring system
Oleksii Misnik, Mykhailo Antonishyn
54-61
PDF (Українська)
MATHEMATICAL AND COMPUTER MODELING
High performance encryption tools of visual information based on cellular automata
Stepan Bilan, Andrii Demash
62-75
PDF
Distribution models of information resources in ACS special purpose
Ihor Subach, Oleksandr Chauzov, Nina Kuchuk
75-84
PDF (Українська)
Quantitative evaluation of reliability of the software-controlled communications
Serhii Hnatiuk, Lev Sakovych, Yevhen Ryzhov
84-90
PDF (Українська)
СOMPUTATIONAL METHODS
The way of effective use of incremental with multiple thinning of test values for Fermat's factoring method
Yevhen Maksymenko
91-99
PDF (Русский)
INFORMATION SECURITY RISK MANAGEMENT
Analyzing of eligibility of complex risks of information security by analytical geometry methods
Volodymyr Mokhor, Oleksandr Bakalynskyi, Oleksandr Bohdanov, Vasyl Tsurkan
100-107
PDF (Українська)
CYBERSECURITY AND CRITICAL INFRASTRUCTURE PROTECTION
Consequences of possible cyberattacks on objects of the critical infrastructure
Serhii Honchar, Hennadii Leonenko
108-113
PDF (Українська)
ELECTRONIC COMMUNICATION SYSTEMS AND NETWORKS
Analysis system clock radio reset with a frequency hopping spread spectrum
Serhii Vasylenko
114-118
PDF (Українська)
Evaluation of energy availability of means to communicate with UAVs in conditions of radioelectronic countermeasures by the enemy
Denys Bakhtiiarov
118-130
PDF (Українська)
Make a Submission
Make a Submission
Information
For Readers
For Authors
For Librarians